Malware Analysis: Introduction to Malware Analysis tutorial | 2022

PBER ACADEMY
PBER ACADEMY
1.3 هزار بار بازدید - 2 سال پیش - #Cybersecurity
#Cybersecurity #training #crashcourse #MalwareAnalysis #learning #malware

Welcome to the Malware Analysis crash course. We will be covering everything you need to know to get started in malware analysis professionally. In this video, we will introduce the course, what we will be covering, introduction to malware & malware analysis, and the various types of malware analysis.

What is Malware

Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a computer. This will happen usually without the knowledge of the owner and is unethical.

Viruses

A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected.

Ransomware

One of the most profitable, and therefore one of the most popular, types of malware amongst cybercriminals is ransomware. This malware installs itself onto a victim’s machine, encrypts their files, and then turns around and demands a ransom (usually in Bitcoin) to return that data to the user.

Scareware

Cybercriminals scare us to purchase a fake application. In a typical scareware scam example, you might see an alarming message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!” Cybercriminals use these programs and unethical advertising practices to frighten users into purchasing rogue applications.

Worms

Worms have the ability to copy themselves from machine to machine, usually by exploiting some sort of security weakness in a software or operating system and it doesn’t require user interaction to function.

Spyware

Spyware is a program installed on your computer, to monitor all forms of communications on the targeted device. Spyware is often used by law enforcement, government agencies, and information security organizations to test and monitor communications in a sensitive environment or in an investigation. Typically example keylogger.. will capture keystrokes and send them to the attacker.

Trojans

Trojans look like harmless applications, Once up and running, they then can steal personal data, crash a device, spy on activities, injection another malware program,s or even launch an attack.

Adware

Adware programs push unwanted advertisements at users and typically display blinking advertisements or pop-up windows when you perform a certain action.

Fileless malware

File less malware is a type of malicious software that uses legitimate programs to infect a computer. File less malware leaves no malware files to scan and no malicious processes to detect. Basically no footprint and also very challenging to detect and remove.


Types of Malware Analysis

Static Analysis

To identify such as file names, hashes, strings such as IP addresses, domains, and file header data can be used to determine whether that file is malicious. Analysis of the malware without actually running it in order to collect information on how the malware works.

Dynamic Analysis

Dynamic malware analysis executes suspected malicious code in a safe environment called a sandbox.


Hybrid

Basic static analysis isn’t a reliable way to detect sophisticated malicious code, and sophisticated malware can sometimes hide from the presence of sandbox technology. By combining basic and dynamic analysis techniques, hybrid analysis provide the security team the best of both approaches –primarily because it can detect malicious code that is trying to hide, and then can extract many more indicators of compromise (IOCs) by statically and previously unseen code. Hybrid analysis helps detect unknown threats, even those from the most sophisticated malware.

-------------------------------------------------------------------------------------------------

I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

Follow Us on Social Platforms:

Facebook: Facebook: Pber-102043678..
Instagram: Instagram: pber.channel
LinkedIn: LinkedIn: pber-academy
Udemy: https://www.udemy.com/user/pber-academy/
Telegram: https://t.me/pberacademy
Blog: https://pber.in/blog/
Pber Academy: https://pber.in


Show your support by
------------------------------------------
LIKE | COMMENT | SHARE | SUBSCRIBE
------------------------------------------


****THANK YOU ALL FOR WATCHING THIS VIDEO. HAPPY LEARNING AND SEE YOU SOON ALL WITH OTHER INTERESTING VIDEOS. ****
2 سال پیش در تاریخ 1400/11/23 منتشر شده است.
1,375 بـار بازدید شده
... بیشتر